Clemson University: Jill Gemmill

Slides:



Advertisements
Similar presentations
Session 6F2013 Hi-Tec ConferenceAustin, Texas Why Should We Hire You?
Advertisements

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
1 Sustaining Technical Programs The NSF’s Advanced Technological Education Program and American Competitiveness Mike Lesiecki, MATEC A Member of the Academic.
Sindhuri Juturu Department of Computer Science Texas Tech University
Von Welch (PI) Susan Sons (HUBzero Engagement Lead) Hubbub September 2014 trustedci.org Cybersecurity for Cyberinfrastructure… and Science!
Company LOGO Broader Impacts Sherita Moses-Whitlow 07/09/09.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
The Future of the BI Infrastructure Community. Broader Impacts Community Timeline April 24-26, st Broader Impacts Infrastructure Summit hosted.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
A little history… CCCS Consortium Grants Colorado Lumina Initiative, Lumina Foundation A forerunner for the developmental education redesign.
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE Any opinions, findings, conclusions.
The National Center for Professional and Research Ethics Presents Ethics CORE Michael C. Loui University of Illinois at Urbana-Champaign.
Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015.
The Hiring Process: A Student and Employer’s View Dr. Ann Beheler Collin College Frisco, TX STEMtech 2014 Supported by: The National Science Foundation.
Updated September 2011 Medical Applications in Nanotechnology Nano Gold Sensors Lab.
QUALITY MEASURES: METROLOGY MADE IN FLORIDA - INDUSTRY TOURS 1 of 12.
Geo-Needs An NSF funded project to explore barriers and opportunities for enhancing geoscience instruction at two-year colleges and minority- serving institutions.
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
FEA CONSORTIUM MEETING: FEA ROLE IN COLLEGE-LEVEL PLANNING October 31, 2011 ADAPP ‐ ADVANCE Office of the Provost Michigan State University 524 South Kedzie.
May 12, 2015 National BILT meeting1 National Business and Industry Leadership Team (BILT) Meeting for Networking and Convergence Technology May 12, 2015.
BIO AC November 18, 2004 Broadening the Participation of Underrepresented Groups in Science.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Promoting Students’ Success in STEM Viz Stars: An opportunity to improve Spatial Visualization Skills! Seven sessions, Fridays, 12:30 - 2:30 pm, March.
Leader Interviews Name, PhD Title, Organization University This project is funded by the National Science Foundation (NSF) under award numbers ANT
Gisella Stalloch Cliff Snellgrove. Understand how scientists manage their data Determine data management issues in specific scientific fields Determine.
This material is based upon work supported by the National Science Foundation under Grant No. DRL Any opinions, findings, conclusions or recommendations.
참 잘 오셨소, 어서 오십시오 The National Center for Information and Communications Technologies A National Science Foundation.
Engineering programs must demonstrate that their graduates have the following: Accreditation Board for Engineering and Technology (ABET) ETP 2005.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Center for Assessment and Improvement of Learning
Planning for Sustainability
Tor Good + Evil.
University Career Services Committee
Training Arkansas Computing Teachers (TACT)
An Open Library of Resources…
Mentoring the Next Generation of Science Gateway Developers and Users
Discussion and Conclusion
Building Strong Partnerships to Support 2YC Geoscience Student Success
CLAS Grant Support Office Kristi Fitzpatrick, Director
Local to Global Perspectives on Sea Level Rise
Alexis Petri, EdD Ronda Jenson, PhD
Critical - thinking Assessment Test (CAT)
Security Essentials for Small Businesses
Introduction to SAGE 2YC
Nanotechnology & Society
Title of Poster Site Visit 2017 Introduction Results
Title of session For Event Plus Presenters 12/5/2018.
Geo-Needs An NSF funded project to explore barriers and opportunities for enhancing geoscience instruction at two-year colleges and minority-serving institutions.
Finding Funding for Arts, Humanities, & Social Sciences
Federated Environments and Incident Response: The Worst of Both Worlds
Comparison to existing state of security experimentation
Cybersecurity Threat Assessment
Institute for Cyber Security Overview
The Secure Contingency Plan
SCIENCE BE HAPPY TEACH SCIENCE WANT TO BE IN DEMAND? TEACH SCIENCE
TEACHING: WORTH IT IN MORE WAYS THAN YOU MIGHT THINK ...
Abusive Partner Accountability and Engagement Training and Technical Assistance Project RTH to welcome and provide tech intro.
[Next steps or other info on your program here]
LabVenture! Redesigning to Maximize Transfer Inside/Outside School
BLOW MINDS! TEACH PHYSICS
TEACHING: WORTH IT IN MORE WAYS THAN YOU MIGHT THINK ...
BLOW MINDS! TEACH MATH TEACHING: WORTH IT IN MORE WAYS THAN YOU MIGHT THINK... Most people underestimate teacher salaries by $10,000-$30,000 Most teaching.
BLOW MINDS! TEACH CHEMISTRY
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
BLOW MINDS! TEACH SCIENCE
Presentation transcript:

CICI Regional: SouthEast SciEntific Cybersecurity for University Research (SouthEast SECURE) Clemson University: Jill Gemmill University of Tennessee-Chattanooga: Tony Skjellum University of Alabama at Huntsville: Sara Graves Voorhees College: Veronical Gadsden Jackson State University: Richard Alo

The Program Survey NSF funded investigators in the SouthEast Provide Cybersecurity Metrics Student-built devices University web site SSL/TLS security & patch speed over time Facilitate communication between research faculty and university IT/Data Security staff. Provide practical assistance On-campus or individual training Downsize great CTSC materials Create engaging content for domain scientists

Some features of the SouthEast New NSF awards in FY14. A total of 579 institutions received funding that year; of these, 47 were HBCUs, 5 were Minority Serving Institutions, and 8 were Hispanic minority serving institutions.

What help with cybersecurity do NSF-PIs need? - SURVEY (anonymous) 707 Responses 10-18% response rate

Who Answered Survey?

Who Answered Survey?

What kind of information technology (IT) systems does your NSF project use (computers, servers, network connected instrumentation, etc.)?  Check all.

Which of the following "cloud" services is your project using Which of the following "cloud" services is your project using? Check all that apply.

Who maintains your IT systems to keep them in working order Who maintains your IT systems to keep them in working order?  Check all that apply.

Where do your NSF project cyber security requirements come from Where do your NSF project cyber security requirements come from?  Check all that apply.

Do you (or your team) create your own websites or write your own software/software modules?

“not sure”; “haven’t thought about it” How does cyber security impact your current NSF projects?  Select the response that most closely matches your opinion. “not sure”; “haven’t thought about it”

What kinds of cyber attacks have impacted your NSF project What kinds of cyber attacks have impacted your NSF project?  Check all that apply.

Please contact me at the email address above about:

Does your cybersecurity training look like this?

What is CyberSecurity? Cybersecurity is the protection of data and computer systems from illicit access or acquisition of equipment, software, and / or data.

Important Facts 91% of cyberattacks start with email Ransomware: software that can encrypt and lock your assess to that data Insider threats are a major concern Intellectual Property (IP) theft can be expensive and can affect your professional career NSF is concerned about cybersecurity and privacy protection

What might be more effective

Collaborative Research: CICI: Regional: SouthEast SciEntific Cybersecurity for University Research (SouthEast SECURE) - Jill Gemmill (PI) This material is based upon work supported by the National Science Foundation under Grants No. 1642102; 1642083; 1642069; and 1642038. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Questions & Discussion Contact Jill Gemmill jbg@clemson.edu